Usability/Human Factors: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 13: Line 13:
|Computing Research Association||||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf'']
|Computing Research Association||||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf'']
|-
|-
|Moore, Tyler||Clayton, Richard||2007||[[Examining the Impact of Website Take-down on Phishing]]||Conference Paper||Low:Technology||[http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime07.pdf  ''Alt Pdf'']
|Moore, Tyler||Clayton, Richard||2007||[[Examining the Impact of Website Take-down on Phishing]]||Conf. Paper||Low:Technology||[http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime07.pdf  ''Alt Pdf'']
|-
|-
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf'']
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf'']

Revision as of 14:27, 20 August 2010

TOC-> Issues->Usability/Human Factors

Author 1 Author 2 Year Title Source Expertise Full Text
Computing Research Association 2003 Four Grand Challenges in Trustworthy Computing Independent Reports None Pdf
Moore, Tyler Clayton, Richard 2007 Examining the Impact of Website Take-down on Phishing Conf. Paper Low:Technology Pdf Alt Pdf
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
Schneier, Bruce 2003 Beyond Fear Book None Scribd
Schneier, Bruce 2008 Schneier on Security Book None Purchase
United States Secret Service 2004 Insider Threat Study Government Report None Pdf
White House 2009 Cyberspace Policy Review Government Report None Pdf
Zittrain, Jonathan L. 2008 The Future of the Internet and How To Stop It Book None Pdf
  • Subcategories: None

Jump to Table of Contents